Got it:

"A TLS server key and self-signed cert for 127.0.0.1 are also required;
     see listen on in the RELAYS section for more details about certificate
     locations."

eg:
openssl req -x509 -days 365 -newkey rsa:2048 \
        -keyout /etc/ssl/private/127.0.0.1.key -out /etc/ssl/127.0.0.1.crt


On Tue, Apr 28, 2020 at 2:36 PM Pascal Guitierrez <
[email protected]> wrote:

> Hi misc@
>
> I am using the example for the TLS inspection from the relayd.conf(5) man
> page:
>
>            # openssl req -x509 -days 365 -newkey rsa:2048 \
>                    -keyout /etc/ssl/private/ca.key -out /etc/ssl/ca.crt
>
> I set the PEM password to "password123"
>
> then have the following relayd.conf:
>            http protocol httpfilter {
>                    return error
>
>                    pass
>                    match label "Prohibited!"
>                    block url "social.network.example.com/"
>
>                    # New configuration directives for SSL/TLS Interception
>                    tls ca key "/etc/ssl/private/ca.key" password
> "password123"
>                    tls ca cert "/etc/ssl/ca.crt"
>            }
>
>            relay tlsinspect {
>                    listen on 127.0.0.1 port 8443 tls
>                    protocol httpfilter
>                    forward with tls to destination
>            }
>
> and i get when running: relayd -n
> /etc/relayd.conf:17: cannot load certificates for relay tlsinspect
>
> tested on 6.6 and -current from a few days prior, both amd64
>
> am i missing a step here?
>
> thankyou!
>

Reply via email to